it risks

Results 126 - 150 of 757Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.
Published By: Patsnap     Published Date: Jul 25, 2016
IP data can be used for a lot more than traditional patent searching. In this white paper we look at how the insights from IP can be used to identify and mitigate risks. And we used virtual reality as our guide.
Tags : 
virtual reality, vr headset, oculus rift, head mounted display, immersive experience, microsoft
    
Patsnap
Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
advanced threats, e-discovery, compliance, rapid response, office 365, email controls, archiving, customer support
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : 
malware, business email compromise, security, it departments, archiving, information protection, advanced technologies, office 365
    
Proofpoint
Published By: Gigamon     Published Date: Feb 20, 2019
IDG survey confirms: CEOs consider cybersecurity a top priority. Get “Countering Escalating Cyberthreats” and improve your threat visibility across the entire network. As CEOs struggle with the risks of a digital business, it is time to adopt a more holistic approach to security. You can distribute traffic to the right tool at the right time, eliminate network weaknesses and keep your CEO happy. Read now.
Tags : 
    
Gigamon
Published By: CA Mainframe     Published Date: Sep 12, 2008
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes you can depend on. In this context, CA’s mainframe Application Quality Management and Testing Tools send very strong messages: the tools are being actively developed and, where appropriate, integrated with equivalent tools on the distributed platforms, to help companies deliver holistic, automated, business services.
Tags : 
ca mainframe, mainframe, application quality, application testing, testing
    
CA Mainframe
Published By: HP - Enterprise     Published Date: Jun 05, 2013
Traditional project management techniques are not working as well as expected. According to research, an average organization has at least $74 million USD (yearly) in at-risk projects. And, even when projects are executed successfully, all too often they still fail to deliver business benefits. So, how do you get started? How do you prioritize which issues to address first? What are the risks and potential rewards? What can you do yourself and where can you need help? This paper helps you answer those questions. It provides important insights into the root causes of project failures and misalignment with business unit expectations, along with possible solutions. It illustrates the path to optimized project and portfolio management from four different starting points, and provides step-by-step advice to help you reach new milestones quickly. It is intended to help you make the transition from managing IT projects to managing business outcomes.
Tags : 
it project, portfolio management
    
HP - Enterprise
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems UK
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems UK
Published By: CAST     Published Date: May 07, 2013
As enterprise IT departments increasingly move toward multi-sourcing environments, it is more important than ever to measure ADM deliverables—not only to manage risks by ensuring overall structural quality of systems, but also to objectively evaluate vendors and make smarter sourcing decisions. This paper describes the eight steps for integrating Sofware Analysis & Measurement (SAM) in your outsourcing relationship lifecycle—from RFP preparation to contract development, team transition and benchmarking—to objectively evaluate the reliability, security, efficiency, maintainability, and size of software deliverables. This measurement can greatly improve the maturity in your outsourcing relationships to enhance performance and reduce risk.
Tags : 
adm, managing risk, sam, software analysis & measurement, sam solutions, vendor management, outsourcing, outsourcers
    
CAST
Published By: BMC Software     Published Date: May 01, 2015
Complex hybrid environments can make it difficult to track interdependencies, increasing the risk of disrupting critical business services. In this research paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services • Accelerate mean time to repair (MTTR) while communicating better with stakeholders • Manage even the most complex hybrid environments more efficiently and effectively • Understand the impact of proposed changes and potential security risks to guide decision-making
Tags : 
hybrid environments, critical business services, mean time to repair, potential security risks, decision-making, cloud optimization, visibility and performance, it management
    
BMC Software
Published By: CEB     Published Date: Nov 06, 2013
Talent is an increasingly critical differentiator of corporate performance and poses one of the most significant barriers to growth. CEB research finds that boards at top-performing companies are twice as likely to have a deep understanding of talent issues as boards at lower-performing competitors. However, most boards lack sufficient understanding of key talent issues facing the companies they oversee, particularly because the data and analysis they receive provide limited insight. This whitepaper outlines the critical talent conversations every board should have and shows how industry leaders are broadening their understanding of talent issues and assurance about critical talent risks by expanding the perimeter of talent issues they monitor beyond executive leadership and reshaping conversations on executive performance evaluation and succession.
Tags : 
talent risks, talent issues, talent management, development roi
    
CEB
Published By: CEB     Published Date: Nov 08, 2013
How is your company managing risk? Download the whitepaper to learn how cross-functional groups can work together to uncover broader enterprise-wide risks that might go unforeseen.
Tags : 
risk, compliance, audit, risk management, cyber security, fraud
    
CEB
Published By: Extreme Networks     Published Date: Feb 23, 2017
The network has never been as critical to the healthcare sector as it is today. Electronic health records, Wi-Fi-connected medical devices, and clinician smart phones are among a plethora of healthcare technologies that depend on a stable network. The consistent development of this infrastructure is key for the healthcare sector to continue its successes in creating new possibilities for management, patient and family experience, and patient outcomes. Extreme Networks posed key questions to Nolan Greene, a senior research analyst with IDC’s Network Infrastructure group, who highlights the critical issues healthcare IT professionals must consider when building a network that maintains industry needs. Download this report to learn about: • Why having a modern healthcare infrastructure is so important • The major challenges IoT brings to healthcare networks • How IEC 80001 is impacting compliance • Trends that confront a network IT professional in healthcare • Risks Healthcare IT must eli
Tags : 
healthcare, iot, iec 800001, extreme networks, healthcare it
    
Extreme Networks
Published By: CA Technologies     Published Date: Jul 13, 2015
The explosive growth of eCommerce has focused attention on security concerns associated with online payment transactions. Cardholders worry about the safety of online transactions while card issuers are concerned about balancing the risks and costs of payment fraud with a loss of revenue caused by transaction abandonment. The 3-D Secure protocol allows payment card issuers to reduce fraud in payment transactions by verifying cardholder identity during Card Not Present (CNP) transactions. Before a transaction is authorized, a cardholder can be challenged to enter a password, answer a question, or use some other form of authentication credential. This interruption in the transaction often causes legitimate customers to abandon the purchase resulting in loss of revenue for the issuer. The challenge is how to reduce fraud without impacting the user purchase experience.
Tags : 
ca technologies, cnp, emv, otp, 3dsecure, data management
    
CA Technologies
Published By: MobileIron     Published Date: Feb 15, 2017
The third edition of the Mobile Security and Risk Review is a must read and provides IT security leaders with timely information about the mobile threat landscape and the emerging risks facing their organizations. The report also includes a list of the most popular business apps, Apple VPP and DEP adoption metrics, top blacklisted mobile apps and information about healthcare and financial services industries.
Tags : 
    
MobileIron
Published By: Dell EMC     Published Date: Aug 22, 2017
Identifying the benefits, costs, and risks associated with an Isilon implementation, Forrester interviewed several customers with experience using Isilon. Dell EMC Isilon is a scale-out NAS platform that enables organizations to store, manage, and analyze unstructured data. Isilon clusters are composed of different node types that can scale up to 68 petabytes (PB) in a single cluster while maintaining management simplicity. Isilon clusters can also scale to edge locations and the cloud
Tags : 
    
Dell EMC
Published By: Mimecast     Published Date: Mar 19, 2019
An Executive Strategy Guide Brought To You By The Cyber Resilience Think Tank Big budget or not, CISOs must make threat intelligence a priority and learn how to focus on only the data that matters—data that will help mitigate future risks. Though the technical definition of threat intelligence may change depending on who you ask, one factor remains constant: If threat intelligence isn’t part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. Read this Cyber Resilience Think Tank executive strategy guide to develop a plan to architect a threat intelligence program in your organization.
Tags : 
    
Mimecast
Published By: Brocade     Published Date: May 02, 2016
By 2020, the Software-Defined Data Center will be a requirement for 75% of the Global 2000’ according to Gartner. But is the SDDC right for you? The key to success is to plan big but start small. This Gartner report will help you understand the value of SDDC, identify the best use cases, and mitigate deployment risks.
Tags : 
    
Brocade
Published By: Onbase     Published Date: Feb 18, 2016
Today’s increasingly competitive global economy requires businesses to make decisions faster than ever. Businesses need instant insight into the status of their people and processes. But manual, paper-based processes undermine decision-making. Paper makes it difficult for businesses to make smart decisions about their operations and their working capital. Manual processes also are costly and inefficient, create headaches for front-line staff, introduce compliance and security risks, and stymie collaboration with trading partners.
Tags : 
finance, decision-making, accounts payable, business practices, finance management
    
Onbase
Published By: Staples     Published Date: Oct 24, 2018
Cybersecurity risks don’t begin and end with your PCs. Watch this webinar to hear HP’s top security expert Ron Chestang detail some surprising security issues lurking in your print network and outline specific controls you can use to minimize the risk.
Tags : 
mps, cybersecurity, print security, managed print, print networks, network security, it security
    
Staples
Published By: illusive networks     Published Date: May 18, 2016
The growing need for cyber insurance is undeniable, yet the landscape is currently operating without standards, mostly due to the high number of unknowns regarding cyber risks. As a result, understanding how cyber insurance can help mitigate the costs for your company, if a cyber attack occurs, is quickly emerging as a best practice. Download this whitepaper and learn about what to consider when purchasing a cyber insurance plan, cyber Insurance Coverage: What Is (and Isn't) Covered, How Much Will the Coverage You Need Cost?, and how to step up cyber security efforts.
Tags : 
    
illusive networks
Published By: CA Technologies     Published Date: Jun 26, 2017
As the United Kingdom and the rest of Europe prepare for Brexit (Britain’s exit from the European Union), information security experts are left wondering what this would mean to the security and risk management processes that have been put in place in the past and how they need to adjust to the emerging reality. This document discusses the impact of Brexit on privileged access management and what information security professionals may consider as immediate solutions to mitigate risks.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure. Opportunity Multiple elements factor into how effectively an enterprise can embrace automation and advance the maturity of their transformation. However, security tools are central to enabling a structured and measured approach to managing critical access risks at each stage of the maturity model journey. With the right privileged access platform and set of tools, enterprises can progressively automate and scale access management to align risk
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.